spitfires
[Top] [All Lists]

Re: Appology / Warning

To: "spitfires@autox.team" <spitfires@autox.team.net>
Subject: Re: Appology / Warning
From: "Mike Ross" <mikeross@Prodigy.net>
Date: Tue, 27 Jun 2000 18:56:19 -0400
Thanks for the warning.  I just got an email from mikeross2@prodigy.net .
Interesting since my email address is mikeross@prodigy.net.  The subject was
"C:\WINDOWS\DESKTOP\Travel Itinerary,..."
The body of the email was: "Message sent from Lotus Word Pro:", and there
was an attachment called: "1_Travel Itinerary, Summer 2000.~ts

A copy was sent to a Lilianross@hotmail.com .

I did not open the attachment and am in the process of updating my virus
scan program to see if it will detect a virus.

If anyone else gets an email from someone with an address nearly identical
to there own, watch out!  Please let us know if you do and if you have the
same attachment.

Thanks,

Mike Ross
'67 Spitfire (soon to be a Spit 6)'66 Spitfire
'69 GT6 (parts car)
'70 GT6
----- Original Message -----
From: "Joe Curry" <spitlist@gte.net>
To: "Graham Stretch" <technical@iwnet.screaming.net>
Cc: "Spitfire List" <spitfires@autox.team.net>; "Triumph List"
<triumphs@autox.team.net>; "2000 Register" <2000-Register@autox.team.net>
Sent: Tuesday, June 27, 2000 5:34 PM
Subject: Re: Appology / Warning


>
> If you don't use Microsoft Outlook, There is no need to worry.
>
> Thank God that these losers only attack Microsoft products!
>
> Joe (Satisfied Netscape user)
>
> Graham Stretch wrote:
> >
> > Hi All
> > First,
> > Sorry but I have just realised that for the last 2 days I have been
> > transmitting a virus on my E mails, I don't know where I got it from,
and
> > only realised after the second time my default signature changed. The
virus
> > is .kak, and is more correctly a worm.I have cleaned my machine by
following
> > the cai.com directions, so feel safe to send this to you without the
risk of
> > further spreading the virus.
> >
> > Second,
> > The fixes for this are complex (to someone like me who is computer
> > illiterate) but a step by step description can be found at
> > http://www.cai.com/virusinfo/encyclopedia/descriptions/wscript.htm
> > A patch for the loop hole this bug exploits is available at
> > http://www.microsoft.com/technet/security/bulletin/ms99-032.asp
> > this virus uses java script and leaves no trace on its carrier messages,
so
> > it is no good looking for the file extension before opening a message.
> > I am not sure whether it can be distributed through the list as I
believe
> > from what I have read it relies on html messages and the list requests
plain
> > text I think.
> > Perhaps some of you with more knowledge on this can explain more fully.
> >
> > Graham.


<Prev in Thread] Current Thread [Next in Thread>